It should be possible to download the audio files directly from archive.org, using a browser.
It should be possible to download the audio files directly from archive.org, using a browser.
You should also say/yell “I do not consent!”, because it’s illegal to search or arrest someone without their consent. It was a popular spell a few years ago, but I don’t see it being used much anymore, so it’s possible that the cops have found a counterspell. 😉
Not an expert, but the only thing I can imagine is that it’s related to certificates or keypairs used for encrypted communication / authentication. Afaik ssl certificates can be issued to a given company, for example, and might become invalid when that company no longer exists. Or it becomes impossible to issue new ones.
Something in that vein, maybe.
Had a similar thing at work not long ago.
A newly deployed version of a component in our system was only partially working, and the failures seemed to be random. It’s a distributed system, so the error could be in many places. After reading the logs for a while I realized that only some messages were coming through (via a message queue) to this component, which made no sense. The old version (on a different server) had been stopped, I had verified it myself days earlier.
Turns out that the server with the old version had been rebooted in the meantime, therefore the old component had started running again, and was listening to the same message queue! So it was fairly random which one actually received each message in the queue 😂
Problem solved by stopping the old container again and removing it completely so it wouldn’t start again at the next boot.
What an amazing businessman!
I’m a Norwegian Linux enthusiast and have never heard anything about the government using Ubuntu or Linux. Seems unlikely, from what I know. I know that within healthcare Windows is still widely used, even on the server side…
On the other hand, a lot of software for official services is being developed as open source now, so that’s at least a good step in the right direction. Example: https://github.com/navikt
I literally have an account there dedicated to porn. Have had it for years. I stopped using Twitter after the muskocalypse, except I still check my porn account every once in a while.
You have to actively go looking for porn there, but once you do it’s a neverending rabbit hole. Especially if you’re into some niche/fetish stuff. There’s some unique stuff to be found there…
It actually wouldn’t surprise me if this turned out to be true
You should remove the executable permission, see my other reply. Movie files should never be executable, but directories should be.
chmod -R -x+X *
should do the trick, that will remove the executable permission on all files, and set it on directories.
This is not correct. Movie files do not need to be executable, and never should be! Not that movie files being executable will cause problems, but it’s possible to imagine a scenario where an attacker could exploit it, especially if the files are owned by root. Extremely unlikely, but I work in IT and always think about security :)
You might be thinking of directories, which do need the executable permission to let a user/group/all be able to read its contents.
You can self-host Bitwarden, and sync your vault to your phone. Maybe not an option for everyone since it requires some technical skills, but very doable.
Oh yeah, I was there for that! Good times! 😂
If you want to make your playbooks/roles more universal, there’s a generic package module which will figure out what package manager to use based on the detected OS.
Or, if that doesn’t fit your needs, you can add conditions to tasks (or blocks of tasks), like
when: ansible_os_family == "Debian"
and use that for tasks specific to a given Linux distro/family.
Ansible will detect a lot of info about each host and make it available as facts. See for example https://docs.ansible.com/ansible/latest/playbook_guide/playbooks_vars_facts.html
I believe it was more like: a guy was accused of cheating (against Magnus Carlsen), and anarchychess on reddit came up with the buttplug theory. Now everyone thinks it actually happened.
There are many ways in. Sometimes no one has to click on or do anything, instead the attacker finds a security vulnerability in e.g. a web application, which gives them access to the server the app is running on. From there the attacker can look for other vulnerabilities to penetrate further into the network. Or if the system/network admin hasn’t properly configured/secured the network, then the attacker can easily move into other parts of the network.
No, you give the AIO container access to your docker daemon and it will create / handle / supervise all the other containers nextcloud needs.
Blade Runner